Professional Documents
Culture Documents
Networking
Networking
which of the following can be considered as the utility is a dream that dates from the beginning of the
computing Industry itself?
1) computing
2) model
3) software
4) all the above
in which of the following a person is constantly followed by another person or group of several
peoples?
1) phishing
2) bulling
3) stalking
4) identity theft
Question 7
which of the following we should configure your systems and networks as correctly as possible
1) protection
2) detection
3) reaction
4) none of the above
Question 9
which is the most of the cloud architectures are build on this type of architecture
1) skeleton
2) grid
3) linear
4) template
Question 10
which one of the following refers to the technique used for verifying the integrity of the message
1) digital signature
2) decryption algorithm
3) protocol
4) message digest
Question 13
Multiple Choice ( Select 1 out of 4 options, for the question below. )
Code Red is a type of _______
1) An Antivirus Program
2) A photo editing software
3) A computer virus
4) A video editing software
Question 14
Multiple Choice ( Select 1 out of 4 options, for the question below. )
Which of the model involves the special types of seervices that user can access on a Cloud
Computing platform?
1) Service
2) Planning
3) Deployment
4) Application
Question 15 Multiple Choice ( Select 1 out of 4 options, for the question below. )
Which of the folllowing is not a type of scanning?
1) Xmas Tree Scan
2) Cloud scan
3) Null Scan
4) SYN Stealth
Question 16
Multiple Choice ( Select 1 out of 4 options, for the question below. )
Which one of the following is related to the services provided by Cloud?
1) Sourcing
2) Ownership
3) Reliability
4) PaaS
Question 17
Multiple Choice ( Select 1 out of 4 options, for the question below. )
The ______ protocol is designed to authenticate the source host and to ensure the integrity of the
payload carried by the IP packet.
1) AH
2) ESP
3) SPE
4) None of the above
Question 18
Multiple Choice ( Select 1 out of 4 options, for the question below. )
In how many parts can we brodly devide the architecture of the Cloud?
1) 4
2) 3
3) 2
4) 5
Question 19
Multiple Choice ( Select 1 out of 4 options, for the question below. )
Which of the following refers to the user's part of the Cloud Computing system?
1) Back-End
2) Management
3) INfrastructure
4) Front End
Question 21
Wi-Fi stands for:
1) wireless fidelity
2) wireless lan
3) wireless flan
4) none of the above
Question 22
A network comprising of multiple topologies:
1) complex
2) hybrid
3) bus
4) star
Question 23
which one of the following is also known as hypervisor?
1) VMA
2) VMM
3) VMS
4) VMR
Question 24
Into which expenditure does coud computing shift capital expenditure?
1) local
2) operating
3) service
4) none of the above
Question 25
The parallels desktop can be considered as the example of which of the following?
1) Tpe 2 Hypervisor
2) DISPATCHER
3) Type 1 Hypervisor
4) interpreter
Question 26
____LAN topology describes the possible conncetions between pairs of networked end points that
can communicate
1) complex
2) physical
3) logical
4) incremental
Question 27
"When bogus reconfiguration commands are used to affect routers and switches to degrade
netwrok performance" Which type of wireless network threat would you classify this under?
1) Network injection
2) malicious association
3) man in the middle attack
4) denial of service
Question 28
A serially connected system of all the hubs of networks
1) bus
2) ring
3) daisy chains
4) star
Question 29
"When there is lack of a central point of control" Which type of wireless network threat would you
classify this under?
1) man in the middle attack
2) identify threat
3) AD Hoc Network
4) None of the above
Question 30
Which one of the following is a type of antivirus program?
1) Quick heal
2) Mcafee
3) Kaspersky
4) All of the above
Question 31
Which of the following is provided by ownership dimension of Cloud Cube Model?
1) Proprietary
2) Owner
3) P
4) All of the mentioned
Question 32
Message authentication is a service beyond
1) message confidentiality
2) message integrity
3) message splashing
4) message sending
Question 33
Which one of the following is a phase of the Deployment process?
1) Selecting Cloud Computing Provider
2) IT Architecture Development
3) Business Architecture Development
4) Transformation Plan Development
Question 34
In the Planning Phase, Which of the following is the correct step for performing the analysis?
1) Cloud Computing Value Proposition
2) Cloud Computing Strategy Planning
3) Both A and B
4) Business Architecture Development
Question 35
Which of the following refers to stealing one's idea or invention of others and use it for their own
benefits?
1) Piracy
2) Plagiarism
3) Intellectual property rights
4) All of the above
Question 36
What is true about VPN in Network security methods?
1) A tool that authenticates the communication between a device and a secure network
2) VPN creating a secure, encrypted "tunnel" across the open internet.
3) VPN typically based on IPsec or SSL
4) All of the above
Question 37
Which of the following refers to exploring the appropriate, ethical behaviors related to the online
environment and digital media platform?
1) Cyber low
2) Cyberethics
3) Cybersecurity
4) Cybersafety
Question 38
It can be a software program or a hardware device that filters all data packets coming through the
internet, a network, etc. it is known as the _____________.
1) Antivirus
2) Firewall
3) Cookies
4) Malware
Question 39
How many types of security boundary values exist in Cloud Cube model?
1) 1
2) 2
3) 3
4) None of the mentioned
Question 40
Message confidentiality or privacy means that the sender and the receiver expect
1) integrity
2) confidentiality
3) Authentication
4) nonrepudiation
Question 41
Which of the following dimension is related to organization's boundaries?
1) Physical location of data
2) Ownership
3) Security boundary
4) All of the mentioned
Question 42
The three different service models are together known as the _________ model of cloud computing.
1) SPI
2) SIP
3) CPI
4) All of the mentioned
Question 43
What was the security algorithm defined for the IEE 802.11 ?
1) WEP
2) RSN
3) WPA
4) SSL
Question 44
Which the 3rd phase of operation in the IEEE 802.11i Protocol ?
1) Protected Data Transfer
2) Discovery
3) Authentication
4) Key Management
Question 45
A hybrid cloud combines multiple clouds where those clouds retain their unique identities but are
bound together as a unit.
1) Public
2) Private
3) Community
4) Hybrid
Question 46
The message digest needs to be
1) public
2) private
3) kept secret
4) integrity
Question 47
Which of the following is related to the service provided by Cloud?
1) Sourcing
2) Ownership
3) Reliability
4) AaaS
Question 48
In which phase of operation does the STA and AS prove their identities to each other ?
1) Discovery
2) Authentication
3) Key generation and distribution
4) Protected data transfer
Question 49
EAP stands for --
1) Extended Application Protocol
2) Extensible Authentication Protocol
3) Embedded Application Protocol
4) Embedded Authentication Protocol
Question 50
Select the most refined and restrictive service model
1) PaaS
2) Caas
3) IaaS
4) All of the above
Question 51
Select the command that will allow SMTP mail to only host 1. 1. 1. 1
1) access-list 10 permit smtp host
2) access-list 10 permit tcp any host 1.1.1.1 eq smtp
3) access-list 110 permit tcp any host 1.1.1.1 eq smtp
4) access-list 10 permit smtp host 1.1.1.1
Question 52
Interaction between the client and server starts via the _______ message.
1) client_hi
2) client_hello
3) server_hello
4) server_hi
Question 53
What are the Parallel Desktops an example of?
1) DISPATCHER
2) INTERPRETER
3) TYPE-1 Hypervisor
4) TYPE-2 Hypervisor
Question 54
What type of the computing technology is used to refer to services and software that usually
operate on a distributed network via virtualized resources?
1) Parallel Computing
2) Soft Computing
3) Cloud Computing
4) Distributed Computing
Question 55
Select the command used to apply an access list to a router interface?
Question 56
What do you call the text that gets transformed using algorithm cipher?
1) Plain Text
2) Scalar text
3) Complex Text
4) Transformed Text
Question 57
What does CHAP stand for?
1) Circuit Handshake authentication protocol
2) Circuit hardware authentication protocol
3) Challenge Hardware authentication protocol
4) Challenge Handshake authentication protocol
Question 58
Select the correct statement in relation to VPN in Network security methods.
1) VPN typically based on IPsec or SSL
2) VPN creating a secure, encrypted "tunnel" across the open internet
3) A tool that authenticates the communication between a device and a secure network
4) All of the above
Question 59
Under which model does SaaS support multiple users and offer a shared data model?
1) Multi-tenancy
2) Multiple-instance
3) single-tenancy
4) None of the above
Question 60
Which is the most essential concept related to Cloud Computing?
1) Abstraction
2) Reliability
3) Productivity
4) All of the above
Question 61
Multiple Choice ( Select 1 out of 4 options, for the question below. )
Triple-DES has _____ keys.
1) 1
2) 2
3) 5
4) 4
Question 62
How many types of service model are mainly present in cloud?
1) 1
2) 2
3) 3
4) 4
Question 63
Multiple Choice ( Select 1 out of 4 options, for the question below. )
In public key crytography, a key that decrypts the message.
1) public key
2) unique key
3) private key
4) security key
Question 64
which of the following is not applicable for IP?
1) Error reporting
2) Handle addressing conventions
3) Datagram format
4) Packet handling conventions
Question 65
Multiple Choice ( Select 1 out of 4 options, for the question below. )
The TTL field has a value 10. How many routers (max) can process this datagram?
1) 11
2) 5
3) 10
4) 1
Question 66
DES stands for?
1) Data Encryption Standard
2) Data Encryption Statistics
3) data Encryption System
4) Data Encryption Sequence
Question 67
Which of the following is the Virtual machine conversion cloud?
1) Amazon CloudWatch
2) AbiCloud
3) BMC Cloud Computing initiative
4) None
Question 68
Multiple Choice ( Select 1 out of 4 options, for the question below. )
________ is a measure of whether the operation is inside or outside the security boundary or
network firewall.
1) Per
2) P
3) Pre
4) All of the mentioned
Question 69
Common gateway interface is used to ___________
1) generate executable files from web content by web server
2) generate web pages
3) stream videos
4) download media files
Question 70
Which of the following statement is true about Grid Computing?
1)
Pieces combine small tasks into complex tasks
2)
The subscription tier plays an important role in grid computing
3)
4)
Both A and C
Breaks complex tasks into small operations
Answer: 4
Question 71
Multiple Choice( Select 1 out of 4 options, for the question below )
A network comprising 0 multiple topologies
1)
Complex
2)
Hybrid
3)
Bus
4)
Star
Answer: 2
Question 72
The Parallels Desktop can be considered as the example of which of the following?
1)
TYPE-2 Hypervisor
2)
DISPATCHER
3)
TYPE-1 Hypervisor
4)
INTERPRETER
Answer: 1
Question 73
Multiple Choice( Select 1 out of 4 options, for the question below )
"When there is a lack of central point of control" Which type of Wireless network threat would you
classify this under?
1)
Man in the middle attack
2)
Identity Theft
3)
Ad Hoc Networks
4)
Non-Traditional Networks
Answer: 3
Question 74
Multiple Choice( Select 1 out of 4 options, for the question below )
A serially connected system of all the hubs of networks
1)
Bus
2)
Ring
3)
Daisy chains
4)
Star
Answer: 3
Question 75
Multiple Choice( Select 1 out of 4 options, for the question below )
Which of the following is also known as a Hypervisor?
1)
VMA
2)
VMM
3)
VMS
4)
VMR
Answer: 2
Question 76
"When bogus reconfiguration commands are used to affect routers and switches to degrade
network performance." Which type of Wireless network threat would you classify this under?
1)
Network Injection
2)
Malicious Association
3)
Man in the middle attack
4)
Denial Of Service
Answer: 1
Question 77
Multiple Choice( Select 1 out of 4 options, for the question below )
Into which expenditures does Cloud computing shifts capital expenditures?
1) local
2) operating
3) service
4) none of the mentioned
Question 78
_______ LAN topology describes the possible connections between pairs of networked end-points
that can communicate.
1) Complex
2) Physical
3) Logical
4) Incremental
Question 79
Multiple Choice( Select 1 out of 4 options, for the question below )
Wi-Fi stands for-
1) Wireless Fidelity
2) Wireless LAN
3) Wireless FLAN
4) None of the mentioned
Question 80
Total steps of deployment stage in cloud computing are?
1) 3
2) 4
3) 5
4) 6
Question 81
Multiple Choice( Select 1 out of 4 options, for the question below )
Among the following layers, which are not relted to SAN architecture
1) Storage layer
2) Host layer
3) Fabric layer
4) Object layer
Question 82
Study of creating a d using excryption techniques
1) Cipher
2) Cryptography
3) Encryption
4) Decryption
Question 83
An indirect form of surveillance.
1) Honey pot
2) Logical
3) Security
4) Intrusion
Question 84
Multiple Choice( Select 1 out of 4 options, for the question below )
What is netiquette?
1) A term used to describe network attacks
2) A malware that pretends to have ethical standards but attacks you when you least suspect it
3) The term for commonly accepted rules of how to behave online
4) Malware that can infect and spread wihtout human assistance
Question 85
A Cipher is which the order is not preserved.
1) Polyalphabetic substitution based
2) Transposition-based
3) Substitution based
4) Public Key based
Question 86
Multiple Choice( Select 1 out of 4 options, for the question below )
The protocol designed to make the security of wireless LAN as good as that of wired LAN
1) WTLS
2) WEP
3) RSN
4) WP
Question 87
After a message is encrypted, it is called________
1) plaintext
2) ciphertext
3) cryptotext
4) None
Question 88
Identify the highest degree of integration cloud computing
1) SaaS
2) PaaS
3) IaaS
4) CaaS
Question 89
Multiple Choice( Select 1 out of 4 options, for the question below )
QPS stands for?
1) Query period sites
2) Quantum per second
3) Quality per service
4) Query per second